 |
|
|
 Zigbee Wireless NetworkingWritten by a member of the ZigBee Alliance, a consortium of over 200 companies promoting and maintaining this standard globally!
ZigBee is a standard based on the IEEE 802.15.4 standard for wireless personal networks. This standard allows for the creation of very lost cost and low power networks - these applications run for... |  |  Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... |  |  Official (ISC)2 Guide to the CISSP CBKThe Official (ISC)² Guide to the CISSP CBK is ideal not only for information security professionals attempting to achieve CISSP certification but also for those who are trying to decide which, if any, certification to pursue. Executives and organizational managers who want a more complete understanding of all the elements that are required in... |
|
 The Zope Book (Landmark)The Zope Book is an authoritative guide to Zope, an open-source Web application server. Zope goes beyond server-side scripting languages like PHP by providing a complete object framework, a built-in Web server, a Web-based management interface, and load-balancing through ZEO (Zope Enterprise Objects). That's a considerable punch, and Zope... |  |  Weaving a Library Web: A Guide to Developing Children's WebsitesWe have entered a digital age in which preschoolers can handle a mouse better than a crayon. In this digital world children want to interact with information, not just receive it. Technology is as ordinary to them as television and radio were to previous generations. Computers and the Internet provide them with information and entertainment,... |  |  |
|
 Practical Matlab Basics for Engineers (Practical Matlab for Engineers)A comprehensive and accessible primer, this tutorial immerses engineers and engineering students in the essential technical skills that will allow them to put Matlab® to immediate use. The book covers concepts such as: functions, algebra, geometry, arrays, vectors, matrices, trigonometry, graphs, pre-calculus and calculus. It then delves into... |  |  |  |  Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |
|
Result Page: 1067 1066 1065 1064 1063 1062 1061 1060 1059 1058 1057 1056 1055 1054 1053 1052 1051 1050 1049 |